Modern Information Technologies in the Sphere of Security and Defence Журнал індексується у <span style="text-decoration: underline;">наукометричних базах даних</span>:</strong></p><ul><li><a href="">Citefactor</a></li><li><a href=";hl=uk">Google Academy</a></li><li><a href=",p24782666,3.html">Index Copernicus</a></li><li><a href="">The Journals Impact Factor</a></li></ul><p><strong>Журнал представлений у наступних</strong> <span><strong><span style="text-decoration: underline;">базах даних</span>:</strong></span></p><ul><li><a href=";type=all&amp;oaboost=1&amp;ling=1&amp;name=&amp;thes=&amp;refid=dcresen&amp;newsearch=1">Bielefeld Academic Search Engine (BASE)</a></li><li><a href="">Directory of Open Access Journals (DOAJ)</a></li><li><a href=";issn=23117249&amp;uid=r4e09b">Research Bible</a></li><li><a href=";q=Modern+Information+Technologies+in+the+Sphere+of+Security+and+Defence">WorldCat</a></li></ul><p><strong>Журнал внесений до каталогів <span style="text-decoration: underline;">бібліотек</span>:</strong></p><ul><li><a href=";I21DBN=UJRN&amp;P21DBN=UJRN&amp;S21STN=1&amp;S21REF=10&amp;S21FMT=juu_all&amp;C21COM=S&amp;S21CNR=20&amp;S21P01=0&amp;S21P02=0&amp;S21P03=PREF=&amp;S21COLORTERMS=0&amp;S21STR=sitsbo">Vernadsky National Library of Ukraine</a></li></ul> en-US <p><span>Authors who publish with this journal agree to the following terms: </span></p><p><span>1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a <a href=""><span>Creative Commons Attribution License</span></a> that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal. </span></p><p><span>2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal. </span></p><p><span>3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See <span><a href="">The Effect of Open Access</a></span>).</span></p><p><span>4. Personal data and metadata contained in articles are available for storage and processing in various databases and information systems, including them in analytical and statistical reports, creating reasonable relationships of scientific </span>, literary and art objects with personal data, etc. on an area which is not limited.</p> (Roman Hrozovskyi) (Roman Hrozovskyi) Wed, 30 Dec 2020 09:26:07 +0000 OJS 60 CONCEPTUAL FOUNDATIONS FOR DEVELOPMENT OF PROGRAMS TO PROVIDE REPAIRABILITY OF COMPLEX TECHNICAL SYSTEMS <p><em>The article proposes the conceptual basis for the development of programs to ensure the maintainability of complex technical systems (СTS). The importance and urgency of the problem of ensuring maintainability for modern STS is considered. It is shown that the reliability program and other documents do not pay due attention to the justification of maintainability at the stages of development and production of СTS. The necessity in substantiation of requirements to this property taking into account three main aspects is considered: technical, economic and organizational. The classification of maintainability indicators and the main groups of factors influencing them is given.</em></p><p><em>It is shown that the stage of research and development work is the main stage of СTS development, which should ensure compliance with the achieved level of maintainability of СTS, which is developed to regulatory requirements; at the same stage, all the main weak elements of the structure must be identified, the main causes of failures must be established. Measures taken at this stage to improve maintainability should take into account and be interrelated with both the manufacturing technology and the strategy of maintenance and repair.</em></p><p><em>According to the results - a modern approach to the problems of improving the maintainability of СTS, as one of the areas of improving the efficiency of operation. The modern approach to the problems of СTS maintainability is defined and the tasks for its solution are specified on the basis of the analysis of the solution of this problem in the USA and other leading countries of the world.</em></p><p><em>The main directions of development of the plan and the program of maintenance of serviceability of СTS at their development and production are formulated. It is shown that the development of the plan and program to ensure the maintainability of СTS will allow to assess the level of maintainability from the moment of approval of the technical task to the moment of serial production. At the same time, it is emphasized the need to take into account that the consideration of the requirements for maintainability, laid down in the program, should become part of any project, as an element of the СTS development program.</em></p> Mychailo Shishanov, Andrei Veretnov, Igor Kondratyuk, Sergii Horbachevskiy Copyright (c) 2021 Mychailo Shishanov, Andrei Veretnov, Igor Kondratyuk, Sergii Horbachevskiy Wed, 30 Dec 2020 00:00:00 +0000 CERTAIN ASPECTS OF OPERATIONAL DELIVERY OF MATERIAL AND TECHNICAL MEANS TO THE DEPARTMENTS OF FAST RESPONSE DURING CONDUCT OF COMMUNITY COMMUNITY <p><em>Certain aspects of prompt delivery of material and technical means to rapid response units during joint operations at the state border with the use of software have been identified.</em></p><p><em>The article highlights the concept of "transportation", its main stages and defines the basic principles of organization of transportation of material and technical means.</em></p><p><em>The article reveals the methodological approaches to the formalization and calculation of key indicators that characterize the process of transportation of material and technical means.</em></p><p><em>This takes into account the methods of accelerated (operational) calculation of the need for transportation of material and technical means. Their advantage is the relatively small cost of time for calculations with allowable errors and deviations from the values obtained by applying the universal method. The application of such dependencies meets the requirements of the guiding documents for mastering the methods of operational planning and organization of material and transport support, transportation of material and technical means, combat and other types of support.</em></p><p><em>The calculations of the accelerated (operational) calculation of the need for transportation are based on the following operational indicators: combat composition of units, pace of hostilities, duration of hostilities, tasks performed by border rapid response units, typical and established rates of consumption and loss of logistics in battle, etc. The need for transportation is determined by the types of material and technical means that have the largest share in the cargo flow (ammunition and fuel), with the accrual of the corresponding percentage of other types of material and technical means of the total need for transportation of ammunition and fuel.</em></p><p><em>Identification and disclosure of certain aspects and methodological approaches to the prompt delivery of logistics to rapid response units, will deepen research to address the issue of operational delivery of logistics to rapid response units.</em></p> Yuri Klyat, Yaroslav Kubetsky, Oleh Uhrynovych, Viktor Holitsyn Copyright (c) 2021 Yuri Klyat, Yaroslav Kubetsky, Oleh Uhrynovych, Viktor Holitsyn Wed, 30 Dec 2020 00:00:00 +0000 WAYS OF DETERMINING QUALITY INDICATORS WEAPONS AND MILITARY EQUIPMENT <p><em>Arms and military equipment are the products of many enterprises of the defense-industrial complex of Ukraine, which take part in their manufacture and repair. Domestic producers to maintain their position in a competitive market need to pay more attention to assessing the level of quality of products and services provided, and use the results of this assessment in production activities in management decisions.</em></p><p><em>The level of quality of samples of armaments and military equipment can be assessed by the ratio of quality characteristics based on the comparison of the obtained values with the base values of the relevant indicators.</em></p><p><em>Therefore, to assess the level of quality of samples of weapons and military equipment received for the replenishment of military units (units) from factories of manufacturers of repair and restoration units (units) proposed a methodological approach to determining the quality of samples of weapons and military equipment.</em></p><p><em>As an option, the quality indicators of samples of armaments and military equipment are classified into groups according to the relevant characteristics. In accordance with the purpose of assessing the level of quality of armaments and military equipment, differential, complex, mixed and statistical assessment methods are considered.</em></p><p><em>To effectively assess the level of quality of samples of armaments and military equipment, it is necessary to develop a model of quality management of automated control of the technological process of manufacturing and repair of armaments and military equipment. The essence of which is to use an automated comparative assessment of indicators that are laid down in the technical documentation with the actual performance of the product.</em></p> Volodymyr Dachkovskyi Copyright (c) 2021 Volodymyr Dachkovskyi Wed, 30 Dec 2020 00:00:00 +0000 IMPLEMENTATION OF THE COMPUTER BUSINESS GAME METHOD USING COMBAT ACTIONS SIMULATION TOOLS <p><em>Using</em><em> business games as a teaching method is based on the simulation of professional activity processes and conditions for their implementation. The hardware-software electronic software </em><em>is </em><em>used </em><em>to </em><em>their conduct allows to create a quasi-professional learning environment and contributes </em><em>to the </em><em>development of computer business games. </em><em>Using</em><em> modern combat operations simulation</em><em> tools</em><em> </em><em>during</em><em> individual and collective training of military specialists opens up additional opportunities for competence formation among</em><em> </em><em>game participants </em><em>while</em><em> solving professional situations in conditions of uncertainty. The experience of using such </em><em>tools</em><em> in the educational process of a higher military school during exercises (training) indicates using computer business game method </em><em>indicates </em><em>the need to improve educational and methodological support them for a more effective </em><em>using</em><em> technical capabilities of combat operations simulation tools.</em></p><p><em>In the article</em><em>,</em><em> the authors, bas</em><em>ed</em><em> on determining features </em><em>of the</em><em> business game method</em><em>,</em><em> the JCATS simulation system, develop a methodological basis for </em><em>the </em><em>implementation of computer business game method using combat actions simulation</em><em> tools</em><em> during exercises (training) with military specialists.</em></p> Liudmyla Zaika, Oleksandr Lavrinchuk, Valerii Krainov Copyright (c) 2021 Liudmyla Zaika, Oleksandr Lavrinchuk, Valerii Krainov Wed, 30 Dec 2020 00:00:00 +0000 DEVELOPMENT OF METHODS OF IDENTIFICATION OF CRISIS SITUATIONS OF INFORMATION DIRECTION <p><em>Hybrid warfare is a combination of traditional and non-traditional methods of warfare, which include the use of special forces, irregular armed groups, information warfare and propaganda, diplomatic measures, cyberattacks, economic pressure and more.</em></p><p><em>The implementation of information security processes involves the mandatory detection of information threats - crisis situations.</em></p><p><em>Given the significant dynamics of change and the density of the flow of crisis situations, the implementation of their identification has the following features: the complexity of formalizing the signs of a crisis situation for identification; signs of a crisis situation can be formed in the form of a set of indicators and (or) criteria; the set of features may contain both objective and subjective indicators and have stochastic or fuzzy uncertainty; lack of a share of information signs of a crisis situation in comparison with the standard; the requirement to obtain a final decision on identification in linguistic form, taking into account the degree of approximation of the object of identification to the standard; the need to obtain an explanation of the formed decision on identification, which is especially important for intelligent decision support systems; large dimension of the problem of identification in the conditions of strict requirements for the efficiency of crisis detection with the density of their flow and significant dynamics of change. The analysis of classical approaches shows their low efficiency for the conditions of crisis identification.</em></p><p><em>Recently, the ideas of synergetics and methods of self-organization have become deeply developed and widespread, in particular in relation to management tasks. Self-organization arises in systems and processes that have the following properties: open architecture; are nonequilibrium; enhance fluctuations, have positive feedback and a sufficient number of interacting elements or transients.</em></p><p><em>There is a uniqueness of the problem of recognizing crisis situations of information direction. It consists of a purely specific list of features for the detection of a controlled process and algorithm of self-organization, which provides a solution to the problem in a large dimension, significant dynamics of change and density of the crisis situation.</em></p><p><em>The purpose of this article is to develop a method of identifying crisis situations of information orientation on the basis of self-organization</em><em></em></p> Andrii Zinchenko, Kostiantyn Sjkolov, Oleh Hudyma Copyright (c) 2021 Andrii Zinchenko, Kostiantyn Sjkolov, Oleh Hudyma Wed, 30 Dec 2020 00:00:00 +0000 THE METHODOLOGICAL APPARATUS OF SUBSTANTIATION AND DETERMINATION OF CONTRIBUTIONS OF SERVICES (BRANCHES) OF TROOPS TO THE REQUIRED LEVEL OF COMBAT CAPABILITY OF ARMED FORCES (AF) OF UKRAINE DURING THEIR USE (REPULSE OF ARMED AGGRESSION) <p><em>In the article it proposed the methodological apparatus of substantiation and determination of contributions of services (branches) of troops to the required level of combat capability of Armed Forces (AF) of Ukraine during their use (repulse of armed aggression)</em><em>, </em><em>which consists three methods: The method of determining the contributions of services (branches) of troops to the required level of capacity of the Armed Forces of Ukraine during the application (counter of armed aggression)</em><em>, </em><em>the method of determining the optimal contributions of </em><em>services (branches) of troops in the successful solution of combat tasks with a established value of prevented damage, while minimizing the necessary costs</em><em> </em><em>and</em><em> </em><em>method of determining the optimal contributions of services (branches) of troops in the successful solution of combat missions with the established amount of prevented damage provided maximum damage to the enemy created by groups of troops</em><em>.</em><em> </em></p><p><em>The method of determining the contributions of services (branches) of troops to the required level of capacity of the Armed Forces of Ukraine during the application (counter of armed aggression) consists of three stages. At the first stage, the initial relations are determined for the subsequent calculation of the contributions of the j-th type of troops in ensuring the required level of capacity of all troops. In the second stage, the basic equations determined the contributions of the j-th type and all types of troops in providing the required number of destroyed weapons of the i-th type and all types of the enemy in order to maintain a given level of capacity of all our troops. At the third stage, there are determined the contributions of our troops to the required number of destroyed the i-th type weapons and all types of the enemy in order to maintain a given level of capacity of all our troops.</em><em></em></p><p><em>The method of determining the optimal contributions of </em><em>services (branches) of troops in the successful solution of combat tasks with a established value of prevented damage, while minimizing the necessary costs, which is part of the methodological apparatus of substantiation and determination of contributions of services (branches) of troops to the required level of combat capability of Armed Forces of Ukraine during their application (repulse of armed aggression) made for its further use by officials of the governing bodies of the Armed Forces of Ukraine, the Armed Forces, as well as the Ministry of Defense of Ukraine to plan the staff of the Armed Forces of Ukraine, forces and means of the tasks forces, determining of prospects for the development of a particular type (genus) of troops, etc.</em></p><p><em>The method is based on the optimization problem of contributions distribution of services of the Armed Forces or military branches of troops in the general contribution of all our troops in destruction of all means of the enemy for achieving the necessary level of combat capability </em><em>q</em><em> </em><em>³</em><em> </em><em>q</em><em> <sup>вим</sup><strong> </strong></em><em>of the Armed Forces of Ukraine.<strong> </strong></em><strong><em> </em></strong><em></em></p><p><em>Prospects for further research are related to the development of recommendations of substantiation and determination of contributions of services (branches) of troops to the required level of combat capability of Armed Forces (AF) of Ukraine during their use (repulse of armed aggression).</em></p> Ruslan Khomchak Copyright (c) 2021 Ruslan Khomchak Wed, 30 Dec 2020 00:00:00 +0000 RECOMMENDATIONS FOR DEFINING THE TASKS OF THE COMPONENTS OF THE INTEGRATED POTENTIAL IN THE LOCAL SPECIAL OPERATION OF ASYMMETRIC COUNTERACTION In unstable conditions of the security environment, any state must respond flexibly to the full range of threats. At the same time, a state that is threatened with the use of military force in combination with strong informational and psychological influence, measures of political and economic pressure may not always have the resources to adequately symmetrically counteraction. This necessitates the organization of asymmetric counteraction, the main form of achieving the goal of which is a “special operation” with appropriate “local special operations”. Given the lack of security and defense sector as a single functional association special operation of asymmetric counteraction is the substantiation of tasks to the subjects that form the integrated potential for its conduction. The purpose of the article is to develop recommendations for defining the tasks of the components of integrated capacity in the local special operation. Operations are specific in purpose and objectives, and therefore limited in time and composition of forces as a form of asymmetric counteraction to the threat of both military and hybrid nature. Their content is the simultaneous or sequential impact on the vulnerable (“pain”) points of the enemy, which significantly reduces the ability of the enemy to continue the aggressive impact. The synergistic effect of asymmetric measures in operations should be provided by their implementation in various areas, which increases the requirements for justification of tasks to the entities involved. The definition of tasks is based on the decomposition of the purpose of the operation using one of the methods of building a system of goals – building a “tree” of objectives. The main system requirements for the list of goals of the lowest level are their completeness, not redundancy and measurability. The content of the goals determines the list of tasks and activities by which they are achieved. The article provides recommendations on the sequence of tasks for counteractions on the basis of a cognitive approach based on the theory and methods of expert systems, expert-significant intermediate scenarios, analysis of hierarchies, etc. Provided recommendations for the development of appropriate formalized documents. Oleksandr Dublayn, Valeriі Dobrogursky Copyright (c) 2021 Oleksandr Dublayn, Valeriі Dobrogursky Wed, 30 Dec 2020 00:00:00 +0000 THE WAYS ASSESSING METHODS OF THE SMBDE OFFENSIVE OPERATION WITH THE FORCING OF A WATER OBSTACLE <p> </p><p><em>An analysis of the experience of forcing water obstacles in local wars and armed conflicts of our time indicates that, based on the factors that affect an offensive battle with the crossing of a water obstacle, military formations of various units fulfill the tasks assigned to them and use different methods of action.</em></p><p><em>However, there have been no systemic studies devoted to the determination of effective (rational) ways of performing tasks that are performed by military formations in an offensive battle with the forcing of a water barrier.</em></p><p><em>Thanks to the proposed method, it is possible to solve the problem, the essence of which is to find a rational way to perform tasks, redistribute the forces and means of a military unit according to the stages of an offensive battle with the forcing of a water barrier, in which the target function will be maximum.</em></p><p><em>To substantiate the recommendations regarding the choice of a rational method of offensive combat with the forcing of a water obstacle by subunits of a military unit from the set of admissible ones, the minimax method was used in the methodology, which makes it possible to select the numerical value of the degree of combat mission fulfillment in accordance with the rational option of subunits' actions.</em></p><p><em>In the future, it is possible to develop a special software product, which will make it possible, on the basis of the input of initial data, to determine the degree of achievement of the required level of combat capabilities of a military formation, the duration of combat and the expected degree of accomplishment of tasks by a military formation.</em></p><p><em>The main components of the improved choosing rational ways method of a separate mechanized brigade offensive operation with the forcing of a water obstacle are given in the article. The methodology is based on the use of a proven mathematical apparatus and allows the commander to make the appropriate decision. </em></p><p><em>The improved ways estimation of tasks performance during conducting offensive operation with forcing of a water obstacle method allows:</em></p><p><em>to determine a rational variant of forces and means redistribution on combat order elements;</em></p><p><em>to assess the effectiveness of a separate mechanized offensive operation with the forcing of a water barrier at certain units courses of action;</em></p><p><em>choose a rational course of action from the permissible ones to conduct the operation.</em></p> Olekcandr Marchenko Copyright (c) 2021 Olekcandr Marchenko Wed, 30 Dec 2020 00:00:00 +0000 DEVELOPMENT OF SCIENTIFIC AND TECHNICAL BASIS OF OPERATIONAL GEOINFORMATIONAL ACOUSTIC MONITORING OF SOURCES OF TERRORIST THREATS <p><em>In order to develop the scientific and technical foundations of creating an artificial intelligence system for monitoring terrorist acts, the paper presents the results of a study of the amplitude-frequency spectra of acoustic emission (AE) of the combustion process of cellulose-containing materials (as one of the main materials used to carry out arson and attacks in organizing terrorist actions in the form of law and order violations in the local territory) of various physicochemical composition. The technical implementation of this effect in the development of automated devices for monitoring acoustic space as part of an operational monitoring system for the terrorist zone, aimed at early identification of the sources of terrorist threats to the normal functioning of the local territory of the state.</em></p> Igor Ruban, Vadym Tiutiunyk, Olha Tiutiunyk Copyright (c) 2021 Igor Ruban, Vadym Tiutiunyk, Olha Tiutiunyk Wed, 30 Dec 2020 00:00:00 +0000 SUGGESTIONS ON INCREASE OF EXACTNESS OF SEGMENTATION ОF URBAN BUILDINGS ON DIGITAL SPACE AND AEROPHOTOS WITH AUTOMATED MONITORING ОF THE URBAN ENVIRONMENT <p><em>In basis of topography that is used in a military sphere, - a capture lies the methods of study of locality. On it, receipt of quantitative and quality descriptions of locality on space and to the airphotos - is one of basic parts of military topography presently. Architecture of U-Net zdkztncz effective enough for the decision of different tasks, such as segmentation of neuron structures, sciagraphy et cetera. A network is characterized by a coder with the sequence of levels of convolutional and maximal pool. Thus, the layer of decoding contains the mirror sequence of convolutional that transponirovan’s. He behaves as traditional automatic encode.</em><em> </em><em>Extractor of functions of U-Net can be modernized for the improvement of maps of segmentation of municipal structures.</em><em> </em><em>Unclear to the neuron decorate a pattern Vanga-Мandelja it maybe to use the classifier of the modified decoder in quality U-Net</em><em>. </em><em>Formal presentation of neuron network ensemble of neuron networks is in-process offered on the basis of the modified rolled up neuron network for segmentation of municipal structures (automatic encode) of U-Net as super position of functions.</em><em> </em><em>Architecture of ensemble of neuron networks is worked out on the basis of the modified convolutional neuron network (СNN) for segmentation of municipal structures (automatic encode) of U-Net. Modification (automatic encode) of U-Net is conducted due to modification of subnet of withdrawal of signs with using as encoder preliminary trained deep СNN VGG, and similarly due to realization of classifier of automatic encode with the use of the modified unclear neuron network Vanga-Мandelja on the basis of INМТ2 for on a pixel classification of certain municipal structures and the generalized topology of by a neuron network model is worked out for segmentation of municipal structures. Modification (automatic encode) of U-Net will allow to promote exactness of segmentation of municipal structures on digital space and airphotos at the automated monitoring of municipal environment.</em></p> Oleksii Kolomiitsev, Volodymyr Pustovarov Copyright (c) 2021 Oleksii Kolomiitsev, Volodymyr Pustovarov Wed, 30 Dec 2020 00:00:00 +0000 PECULIARITIES OF CONSTRUCTION OF MATHEMATICAL MODEL OF DETERMINATION OF PARAMETERS FOR INTERCEPTION OF AIR TARGETS <em>The article proposes an approach to formalize knowledge about the process of determining the parameters of the planned interception using heuristic methods, which are the best in terms of practice, experience, intuition, knowledge of decision makers when aiming fighters at air targets, and looking for solutions within some subspace of possible solutions. The proposed mathematical model allows to formalize the factors that are taken into account when guiding fighters, in the form of linguistic and interval-estimated parameters for each option, which allow to take into account the uncertainty. The initial data of the method is a recommendation regarding the appropriate method of guidance, the hemisphere of the attack of the fighter during guidance. Decisions on the application of the appropriate method of guidance is possible only after the analysis of the conditions of hostilities, the tactical position of the fighter at the time of detection of air targets, taking into account the dynamic characteristics of each method of guidance. It is revealed that automation of information preparation, formation of various variants of application of parameters of the planned interception, is possible at the expense of realization of the corresponding system of support of decision-making. It is substantiated that a logical-linguistic production hierarchical model is expedient as a mathematical model for determining the parameters of interception..</em> Natalia Korolyuk Copyright (c) 2021 Natalia Korolyuk Wed, 30 Dec 2020 00:00:00 +0000 METHODOLOGY OF DEVELOPING SCENARIOS OF RADIOELECTRONIC AND ELECTROMAGNETIC SUPPRESSION OF NATIONAL TELECOMMUNICATIONS NETWORK IN THE CONDITIONS OF THE SPECIAL PERIOD <p><em>Annotation. Interference protection of the communication system is a relevant and important researching area, impact assessment methodology of radio (RS) and electromagnetic suppression (EMS) is rather developed and known for today. The National Telecommunication Network (NTN), as a set of communication systems and networks, in the context of a hybrid war against Ukraine requires protection improvement from the destructive influence of the enemy, which has the latest RP and EMF. Unsecured NTN will not be able to perform its main function, namely the circulation (transmission, reception, creation, processing and storage) and protection of national information resources, providing secure electronic communications, providing a range of modern secure information and communication (multiservice) services in the interests of government in peacetime, in a state of emergency and during a special period. In addition, NTN is a dual-purpose network (system) with partial usage of its resources to provide services, including cyber security, to other consumers. Qualitative development of methods and techniques to ensure interference protection of NTN elements is impossible without predicting possible scenarios of the enemy and the interference situation that may arise.</em></p><p><em>It is proposed to use scenarios approach during adaptive algorithm development of interference protection of special means of communication against active radio and electromagnetic suppression of the enemy in hybrid actions and terrorist activities. </em></p><p><em>The method of substantiation of scenarios of RS and EMS of the transport platform (TP) of NTM and determination of scenarios of complex signal-interference situation is developed. These scenarios are necessary for the further synthesis of adaptive interference protection algorithms of TP NTN.</em></p><p><em>The method allows substantiating the composition and usage of RS and EMS measures of enemy within the timeline and b the elements of TP NTN terms of hybrid war against Ukraine.</em></p><p><em>It is concluded that it is necessary to synthesize the interference protection algorithms of communication channels, which will be adaptive to different scenarios of signaling, and interference situation that may occur.</em></p> Hryhorii Tikhonov, Serhii Sholokhov, Yurii Hordienko Copyright (c) 2021 Hryhorii Tikhonov, Serhii Sholokhov, Yurii Hordienko Wed, 30 Dec 2020 00:00:00 +0000 OPTION OF THE STRUCTURE OF THE AUTOMATIC STABILIZATION OF THE PLATFORM ANTENNA FIELD OF A MOBILE OBJECT <p><em>The article proposes a variant of constructing a digital system for automatic stabilization of the antenna field platform located on an object (vehicle), and also considers the structural diagrams of control channels. The choice of executive devices to ensure the performance and accuracy of the system is substantiated. The conditions of use, restrictions and initial data necessary for the synthesis of the automatic stabilization system are determined, the principles of calculating by the system - the coordinates of the position of the antenna field platform in space - are highlighted.</em></p><p><em>The prerequisites for the use of a platform with stabilization at the facility is the need to ensure the most efficient use of communication facilities (antenna systems) in a complex electromagnetic environment and to reduce the deployment (folding) time, adjust radio and satellite communications in the operational-tactical and tactical control levels.</em></p><p><em>The system of automatic stabilization of the antenna field platform will provide optimal conditions for the interaction of antenna systems that are part of the antenna field of radio-electronic means of the compact constellation. Optimal conditions should be understood as vertical placement of omnidirectional antennas, the possibility of changing the position of directional antennas in the azimuthal plane and ensuring the electromagnetic compatibility of radio electronic means. The deviation of the platform from the required angular positions of the reference coordinate system can be determined by accelerometers or other devices that measure the linear acceleration of an object in a given plane.</em></p><p><em>It is proposed to stabilize the platform through two channels for each of the axes. The angular position of the stabilized platform in space is specified in the reference coordinate system, which is not associated with a moving object (vehicle) that is moving, and in a moving coordinate system, it is rigidly connected with this object. It is proposed to use an inertial coordinate system as a reference coordinate system, that is, motionless relative to the horizon, which is oriented at a given point on the earth's surface. The proposed automatic system is universal, with the ability to adapt to the driving performance of a moving object. Adaptability is ensured by the presence in the control loop of an automatic stabilization system of circuits, the parameters of the transfer functions of which are pre-calculated for the tactical and technical characteristics of the moving object.</em></p> Vasyl Kuzavkov, Arthur Zarubenko Copyright (c) 2021 Vasyl Kuzavkov, Arthur Zarubenko Wed, 30 Dec 2020 00:00:00 +0000 METHOD OF TECHNICAL JUSTIFICATION OF REQUIREMENTS FOR UNMANNED AIRCRAFT GROUPS DETECTION AND RESOLVING <p><em>Modern unmanned aerial vehicles (UAVs) perform a wide range of tasks in the military sphere. The expansion of the range of such tasks causes constant technical improvement of both the drones themselves and the means of countering UAVs. The direction of tactics and technics for using drones as part of a group is rapidly developing.</em></p><p><em>The existing countermeasures have limited capabilities to detect UAV groups and resolve them in the group. Thus, there is an acute problem of group detection and resolving of UAV groups.</em></p><p><em>At the stages of analysis and assessment of this problem, the requirements for the detection and resolving of UAV groups must be technically justified.</em></p><p><em>The purpose of this article is to develop a method to improving the quality of detection and separation of UAVs as sources of radio emission (SRE), by improving the known method of technical justification of requirements based on the use of adaptive direction finders with superresolution.</em></p><p><em>As result of the study, it was found that the steepness of the change of the weight vector signal in the area of directions on SRE is much greater than the steepness of the angular spectrum peaks at the output of the adaptive antenna array. This property was investigated and used to increase the angular resolution of the UAV’s SREs in adaptive direction finder. The estimation of the boundary angular resolution is obtained by using the weight vector signal as an angular power spectrum depending on the parameters of the input signal.</em></p> Denys Koval Copyright (c) 2021 Denys Koval Wed, 30 Dec 2020 00:00:00 +0000 ANALYSIS OF EXISTING APPROACHES TO ESTIMATING THE FUNCTIONAL STABILITY OF HETEROGENEOUS INFORMATION SYSTEMS FOR MILITARY PURPOSES <p><em>The article provides a comparative analysis of approaches, methods and formalized mathematical descriptions used to assess the functional stability of heterogeneous information systems. Features and criteria of functional stability are considered. The definitions of the concepts of functional stability, heterogeneous information systems, indicator and criterion of functional stability are given. The difference between the concepts of stability of functioning and functional stability of complex technical systems is indicated. Formalized descriptions of the structural and probabilistic criteria for the functional stability of the structure of a heterogeneous information system are given.</em> <em>The mathematical formalization of the functional stability indicator for structures with serial and parallel connection of elements is given. The indicator of the structural complexity of the data transmission system of the automated air traffic control system is mathematically formalized. The article presents a method for assessing the functional stability of an automated air traffic control system and a method for calculating a generalized probabilistic indicator of functional stability as a convolution of the structure connectivity matrix. The directions of further research on the assessment of the functional stability of heterogeneous information systems are determined.</em></p> Oleksandr Huk, Oleksandr Permiakov, Oleksandr Nesterov, Tetiana Uvarova Copyright (c) 2021 Oleksandr Huk, Oleksandr Permiakov, Oleksandr Nesterov, Tetiana Uvarova Wed, 30 Dec 2020 00:00:00 +0000 APPLICATION OF THE MULTI-AGENT CONTROL SYSTEM OF THE MODEL OF FUNCTIONING OF THE TELECOMMUNICATION NETWORK FRAGMENT BY COMMUNICATION SYSTEMS OF THE ARMED FORCES OF UKRAINE <p><em>Today, there are many standards that describe the architecture and mechanisms for monitoring and controlling elements of the Carrier Ethernet network, but there is no single methodology and requirements for the control system of such a communication network are not formed. This article proposes a solution to this problem by modeling the process of functioning of a telecommunication network based on this technology to manage its configuration. To create this model, the AnyLogic simulator was selected.</em><em> </em><em>The aim of the work is to identify the relationship between the reliability indicators of a telecommunication network based on Carrier Ethernet technology and the process of functioning of the telecommunication network management and recovery subsystems. As well as obtaining the dependence of the availability factor on the duration of the time between failures, the time of failure and on the quantitative characteristics of the configuration of the simulated network fragment. The multi-agent system, which is part of the control system, is in interaction with it.</em><em> </em><em>The use of a distributed telecommunications network control facility based on Carrier Ethernet technology at MASU will provide a demonstration of the dynamics of changes in the state of a fragment of a telecommunications network and obtain an estimate of network reliability. The solution to the problem of building the MASU model is based on the use of agent-based modeling, which belongs to the class of agent-based models. The paper uses the provisions of probability theory, control theory and system theory.</em><em> </em><em>The novelty of the presented model lies in the selection of a new Carrier Ethernet control object, the selection of an original set of control and management mechanisms for their inclusion in the model, and the use of the mathematical apparatus of agent modeling.</em><em> </em><em>Using the presented model to study the functioning of a telecommunication network allows you to track the behavior of each node and each route with its own failure and recovery rates for a network structure of any complexity, and allows you to solve problems associated with determining the length of time to lose connectivity in the route and the duration of the time between failures all routes simultaneously, allows you to form an assessment of network reliability and fault tolerance.</em><em></em></p> Volodymyr Rudenko, Mykhailo Zinchenko, Natalia Gryshina, Viktor Chenchenko Copyright (c) 2021 Volodymyr Rudenko, Mykhailo Zinchenko, Natalia Gryshina, Viktor Chenchenko Wed, 30 Dec 2020 00:00:00 +0000 DETERMINATION OF THE NUMERICAL VALUE OF A GENERALIZED INDICATOR OF THE VALUE OF INFORMATION FROM THE POINT OF VIEW OF ITS SECURITY <p><em>In the context of ensuring the security of information in specific conditions, a number of difficulties arise due to the fact that the selected properties of information are heterogeneous and not commensurate, the areas of acceptable values of characteristics and properties of protection are not defined, which are derived from what is protected and directly depend on the properties the information itself, which in turn are set by the owner of the information. Moreover, it is of interest for the purpose of determining the value of protection, the definition of quantitative indicators of the properties of protection.</em></p><p><em>Information security metrics in appropriate methodologies that are based on verification and risk-orientation approaches are not sufficiently informative, since they take into account only objective aspects of security, completely ignoring subjective ones. They do not allow to make sound judgments about the state of confidentiality, integrity and accessibility of information and the level of information security of the organization as a whole. In this regard, the authors propose an approach to determine the numerical value of a generalized indicator of the value of information on the basis of the logico-linguistic model of evaluating the properties that characterize this indicator and the method of pairwise comparisons used to determine the numerical values of the coefficients of importance of these properties.</em></p><p><em>In this paper, we propose an approach for solving the task regarding the quantitative assessment of heterogeneous properties of information and the coefficients of their significance in the interests of information protection and to determine the influence of information properties that are set by the owner of the information security system on a generalized indicator of the value of information. At the same time, for the estimation of the numerical values of the considered properties of information, it is proposed to use the apparatus of the theory of fuzzy sets, and the determination of the corresponding coefficients of importance is carried out by the method of analysis of Saati hierarchies.</em></p> Nikolay Radchenko, Oleksiy Dragluk, Mihael Korotkov, Olexandr Bidnyi Copyright (c) 2021 Nikolay Radchenko, Oleksiy Dragluk, Mihael Korotkov, Olexandr Bidnyi Wed, 30 Dec 2020 00:00:00 +0000 IMPROVING INTERNET RELATIONSHIP TOPOLOGY BY RISK ASSESSMENT <p><em>The Internet operates and is constantly growing due to global routing system, the scalability of which is indisputable. But this system has certain information security flaws, due to which there are threats of deliberate distortion of packet transmission paths in order to violate the integrity, accessibility and confidentiality of information. Such actions are called "route hijacks". The mechanisms of the mentioned cyberattacks are aimed at imposing on misconception or, in other words spoofing the network topology derived from routing tables, while mechanisms for validation of this information in the global routing protocol BGP-4 are absent. This vulnerability cannot be completely addressed without replacing the BGP-4 protocol, which could take another decade.</em></p><p><em>Reducing the potential impact of cyber attacks on global routing requires a new methodology for assessing the effectiveness of interconnections and improving the network topology. Thus, the paper studies usage of a modern risk-oriented approach, when the risk owner uses the value of risk as a measure of information security. The proposed methodology is based on the analysis of the topology of the Internet, subjects, objects and processes of global routing. The owner of the risk is determined, the risks themselves are identified.</em></p><p><em>New metrics have been introduced to assess the risk of route interception - a trust metric and a significance metric. The trust metric characterizes the probability of a route hijack at a certain node and depends on the metric distance between the risk owner and the target node. The concept of subject of trust and object of trust is introduced. Significance metrics characterizes the level of maximum damage associated with the area of the expected spread of the spoofed route. It is complex and takes into account the number of network prefixes routed through the target node, the weight of the prefix according to its length, and the distance between the source of the prefix and the target node. Risk assessment based on these metrics serves as a measure of the effectiveness of the topology in protecting against interception of routes, and provides an opportunity to make decisions on improving interconnections, using risk to measure the information security.</em></p> Vitalii Zubok Copyright (c) 2021 Vitalii Zubok Wed, 30 Dec 2020 00:00:00 +0000